100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C839 INTRO TO CRYPTOGRAPHY 2025 OA PREPARATION TEST BANK WITH 690 REAL EXAM QUESTIONS AND CORRECT VERIFIED ANSWERS GRADED A+/ C839 PREP FOR OA AND PRE-ASSESSMENT $30.99   Add to cart

Exam (elaborations)

WGU C839 INTRO TO CRYPTOGRAPHY 2025 OA PREPARATION TEST BANK WITH 690 REAL EXAM QUESTIONS AND CORRECT VERIFIED ANSWERS GRADED A+/ C839 PREP FOR OA AND PRE-ASSESSMENT

 7 views  0 purchase
  • Course
  • WGU C839 INTRO TO CRYPTOGRAPHY
  • Institution
  • WGU C839 INTRO TO CRYPTOGRAPHY

WGU C839 INTRO TO CRYPTOGRAPHY 2025 OA PREPARATION TEST BANK WITH 690 REAL EXAM QUESTIONS AND CORRECT VERIFIED ANSWERS GRADED A+/ C839 PREP FOR OA AND PRE-ASSESSMENT

Preview 4 out of 130  pages

  • October 25, 2024
  • 130
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • wgu c839
  • WGU C839 INTRO TO CRYPTOGRAPHY
  • WGU C839 INTRO TO CRYPTOGRAPHY
avatar-seller
muriithikelvin098
WGU C839 INTRO TO CRYPTOGRAPHY 2025
OA PREPARATION TEST BANK WITH 690
REAL EXAM QUESTIONS AND CORRECT
VERIFIED ANSWERS GRADED A+/ C839
PREP FOR OA AND PRE-ASSESSMENT

a cryptographic algorithm or protocol tailored for implementation in constrained
environments, including RFID tags, sensors, contactless smart cards, and
healthcare devices
lightweight cryptography
Which backdoor cryptography method involves having a copy of the encryption
key that law enforcement agents could use if they require access to the data?

A Key escrow
B Encryption by default
C RSA cracking
D NOBUS backdoor
A
Which of the following is NOT required for a hash?

A Minimum key length of 256 bits
B Variable-length input, fixed-length output
C Non-reversible
D Few collisions
A
A system administrator received an encrypted message from one of the company's
software vendors. Which cryptographic technique can the system administrator use
to authenticate the message sender and also ensure that the message has not been
tampered with?



pg. 1

,A One-time passwords (OTP)
B Salting
C LM hash
D Hash-based message authentication code (HMAC)
D
A developer wants to install a newly released patch received from a software
manufacturer. Which cryptographic algorithm can the developer use to trust that
the software truly came from the vendor and that the patch has not been altered or
manipulated?

A Public-key algorithm
B Secret-key algorithm
C Hashing function
D Digital signature algorithms
D
Which internationally recognized standard is used in public-key infrastructure
(PKI) to define the format of public-key certificates?

A FIPS 199
B Digital Signature Standard (DSS)
C FIPS 140-2
D X.509 standard
D
Which key method is used to create the tunnel in SSL/TLS connections?

A Session key method
B Symmetric key method
C Hashing method
D Asymmetric key method
B
Who sends the digital certificate and the selected cipher suites to use during RSA
key exchange in HTTPS connections?



pg. 2

,A Neither the server nor the client
B The client
C The server and the client
D The server
D
the process by which VPN packets reach their intended destination, which is
typically a private network
tunneling
a secure, encrypted connection over a publicly shared network
virtual private network (VPN)
using subscriber computers to route data packets over the internet, instead of using
publicly available routers.
onion routing
Which encryption cracking method involves an intruder sending a legitimate
message into the network at some future time?

A Time attack
B Cut-and-paste
C Chosen-ciphertext
D Replay system
D
when a copy of the encryption key is kept in escrow so that it can be used by a
government agent
key escrow
where it is mathematically possible for government agents to crack the encryption,
but no one else can
NOBUS ("nobody but us") backdoor
An intruder wants to break an encrypted message. After successfully accessing the
crypto device, the attacker first runs a plaintext through the device to see how its
encryption process works. Then the intruder alters the plaintext to see how the


pg. 3

, alteration affects the ciphertext that is being generated. What attack method is the
intruder using?

A Chosen attack
B Known plaintext attack
C Ciphertext-only attack
D Adaptive chosen attack
D
In the process of doing an encryption and decryption, a security engineer steps
away for lunch. While the security engineer was gone, an unsuspecting intruder sat
down at the engineer's desk and ran ciphertext through the crypto device to see the
result. Which attack method best describes this scenario?

A Adaptive chosen attack
B Chosen attack
C Adaptive chosen ciphertext attack
D Chosen ciphertext attack
D
the study of ciphertext, ciphers, and cryptosystems with the aim of understanding
how they work and finding and improving techniques for defeating or weakening
them
cryptanalysis
the process of systematically entering every word in a dictionary as a password to
see if the hashed code matches the one in the password file.
dictionary attack
Which combination of applications mostly uses lightweight cryptography?

A Tablets and RFID
B Servers and RFID
C Desktops and smartphones
D RFID and sensor networks
D



pg. 4

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller muriithikelvin098. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $30.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81298 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$30.99
  • (0)
  Add to cart